[ 5.675011][ T24] audit: type=1400 audit(1652624262.362:69): avc: denied { open } for pid=1567 comm="getty" path="/run/utmp" dev="tmpfs" ino=2 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5.678190][ T24] audit: type=1400 audit(1652624262.362:70): avc: denied { lock } for pid=1567 comm="getty" path="/run/utmp" dev="tmpfs" ino=2 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5.681903][ T24] audit: type=1400 audit(1652624262.362:71): avc: denied { read } for pid=1567 comm="getty" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 syzkaller syzkaller login: [ 11.888926][ T24] audit: type=1400 audit(1652624268.582:72): avc: denied { transition } for pid=1634 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.894446][ T24] audit: type=1400 audit(1652624268.582:73): avc: denied { write } for pid=1634 comm="sh" path="pipe:[14181]" dev="pipefs" ino=14181 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 12.531374][ T1637] scp (1637) used greatest stack depth: 11200 bytes left Warning: Permanently added '10.128.0.142' (ECDSA) to the list of known hosts. 2022/05/15 14:17:54 fuzzer started 2022/05/15 14:17:54 dialing manager at 10.128.0.163:33917 [ 18.878814][ T24] audit: type=1400 audit(1652624275.572:74): avc: denied { mounton } for pid=1804 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.879555][ T1804] cgroup: Unknown subsys name 'net' [ 18.885219][ T24] audit: type=1400 audit(1652624275.572:75): avc: denied { mount } for pid=1804 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.890902][ T24] audit: type=1400 audit(1652624275.582:76): avc: denied { unmount } for pid=1804 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.015777][ T1804] cgroup: Unknown subsys name 'rlimit' 2022/05/15 14:17:55 syscalls: 2727 2022/05/15 14:17:55 code coverage: enabled 2022/05/15 14:17:55 comparison tracing: enabled 2022/05/15 14:17:55 extra coverage: enabled 2022/05/15 14:17:55 delay kcov mmap: enabled 2022/05/15 14:17:55 setuid sandbox: enabled 2022/05/15 14:17:55 namespace sandbox: enabled 2022/05/15 14:17:55 Android sandbox: enabled 2022/05/15 14:17:55 fault injection: enabled 2022/05/15 14:17:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/05/15 14:17:55 net packet injection: enabled 2022/05/15 14:17:55 net device setup: enabled 2022/05/15 14:17:55 concurrency sanitizer: enabled 2022/05/15 14:17:55 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/05/15 14:17:55 USB emulation: /dev/raw-gadget does not exist 2022/05/15 14:17:55 hci packet injection: /dev/vhci does not exist 2022/05/15 14:17:55 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2022/05/15 14:17:55 802.15.4 emulation: enabled [ 19.115586][ T24] audit: type=1400 audit(1652624275.812:77): avc: denied { mounton } for pid=1804 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.140381][ T24] audit: type=1400 audit(1652624275.812:78): avc: denied { mount } for pid=1804 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.163664][ T24] audit: type=1400 audit(1652624275.812:79): avc: denied { create } for pid=1804 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 19.184078][ T24] audit: type=1400 audit(1652624275.812:80): avc: denied { write } for pid=1804 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 19.204468][ T24] audit: type=1400 audit(1652624275.812:81): avc: denied { read } for pid=1804 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/05/15 14:17:56 suppressing KCSAN reports in functions: '__xa_clear_mark' 'blk_mq_sched_dispatch_requests' 'xas_clear_mark' 'shmem_file_read_iter' 'dont_mount' 'filemap_read' 'do_select' 'generic_fillattr' 2022/05/15 14:17:56 fetching corpus: 0, signal 0/2000 (executing program) 2022/05/15 14:17:56 fetching corpus: 45, signal 17523/21066 (executing program) 2022/05/15 14:17:56 fetching corpus: 91, signal 22826/27931 (executing program) 2022/05/15 14:17:56 fetching corpus: 136, signal 29550/35972 (executing program) 2022/05/15 14:17:56 fetching corpus: 184, signal 36026/43699 (executing program) 2022/05/15 14:17:56 fetching corpus: 234, signal 38916/47899 (executing program) 2022/05/15 14:17:56 fetching corpus: 284, signal 43635/53679 (executing program) 2022/05/15 14:17:56 fetching corpus: 334, signal 46294/57503 (executing program) 2022/05/15 14:17:56 fetching corpus: 383, signal 49551/61773 (executing program) 2022/05/15 14:17:56 fetching corpus: 433, signal 51650/64936 (executing program) 2022/05/15 14:17:56 fetching corpus: 483, signal 54382/68588 (executing program) 2022/05/15 14:17:56 fetching corpus: 532, signal 56456/71622 (executing program) 2022/05/15 14:17:56 fetching corpus: 582, signal 59053/75044 (executing program) 2022/05/15 14:17:56 fetching corpus: 632, signal 60837/77760 (executing program) 2022/05/15 14:17:57 fetching corpus: 681, signal 64479/81873 (executing program) 2022/05/15 14:17:57 fetching corpus: 730, signal 66503/84650 (executing program) 2022/05/15 14:17:57 fetching corpus: 780, signal 68105/87042 (executing program) 2022/05/15 14:17:57 fetching corpus: 830, signal 69875/89513 (executing program) 2022/05/15 14:17:57 fetching corpus: 880, signal 71091/91523 (executing program) 2022/05/15 14:17:57 fetching corpus: 930, signal 72999/93984 (executing program) 2022/05/15 14:17:57 fetching corpus: 980, signal 74680/96315 (executing program) 2022/05/15 14:17:57 fetching corpus: 1030, signal 76180/98410 (executing program) 2022/05/15 14:17:57 fetching corpus: 1080, signal 77391/100272 (executing program) 2022/05/15 14:17:57 fetching corpus: 1130, signal 78702/102153 (executing program) 2022/05/15 14:17:57 fetching corpus: 1180, signal 79766/103886 (executing program) 2022/05/15 14:17:57 fetching corpus: 1230, signal 81612/106038 (executing program) 2022/05/15 14:17:57 fetching corpus: 1280, signal 82866/107734 (executing program) 2022/05/15 14:17:57 fetching corpus: 1330, signal 84231/109500 (executing program) 2022/05/15 14:17:57 fetching corpus: 1380, signal 87324/112347 (executing program) 2022/05/15 14:17:57 fetching corpus: 1430, signal 88347/113847 (executing program) 2022/05/15 14:17:57 fetching corpus: 1480, signal 89860/115611 (executing program) 2022/05/15 14:17:57 fetching corpus: 1530, signal 90984/117055 (executing program) 2022/05/15 14:17:57 fetching corpus: 1580, signal 92608/118816 (executing program) 2022/05/15 14:17:57 fetching corpus: 1630, signal 94161/120437 (executing program) 2022/05/15 14:17:57 fetching corpus: 1680, signal 95047/121684 (executing program) 2022/05/15 14:17:57 fetching corpus: 1730, signal 96508/123185 (executing program) 2022/05/15 14:17:57 fetching corpus: 1780, signal 97326/124357 (executing program) 2022/05/15 14:17:58 fetching corpus: 1829, signal 98248/125553 (executing program) 2022/05/15 14:17:58 fetching corpus: 1879, signal 99625/126931 (executing program) 2022/05/15 14:17:58 fetching corpus: 1928, signal 100761/128192 (executing program) 2022/05/15 14:17:58 fetching corpus: 1978, signal 101606/129290 (executing program) 2022/05/15 14:17:58 fetching corpus: 2028, signal 103568/130874 (executing program) 2022/05/15 14:17:58 fetching corpus: 2077, signal 105148/132207 (executing program) 2022/05/15 14:17:58 fetching corpus: 2127, signal 106850/133547 (executing program) 2022/05/15 14:17:58 fetching corpus: 2174, signal 107860/134626 (executing program) 2022/05/15 14:17:58 fetching corpus: 2223, signal 108544/135522 (executing program) 2022/05/15 14:17:58 fetching corpus: 2273, signal 109270/136418 (executing program) 2022/05/15 14:17:58 fetching corpus: 2323, signal 110231/137333 (executing program) 2022/05/15 14:17:58 fetching corpus: 2372, signal 111120/138236 (executing program) 2022/05/15 14:17:58 fetching corpus: 2422, signal 112049/139116 (executing program) 2022/05/15 14:17:58 fetching corpus: 2472, signal 113264/140060 (executing program) 2022/05/15 14:17:58 fetching corpus: 2521, signal 113967/140848 (executing program) 2022/05/15 14:17:58 fetching corpus: 2571, signal 114892/141658 (executing program) 2022/05/15 14:17:58 fetching corpus: 2621, signal 115850/142436 (executing program) 2022/05/15 14:17:58 fetching corpus: 2671, signal 116439/143123 (executing program) 2022/05/15 14:17:58 fetching corpus: 2721, signal 117494/143887 (executing program) 2022/05/15 14:17:58 fetching corpus: 2771, signal 118343/144578 (executing program) 2022/05/15 14:17:59 fetching corpus: 2821, signal 118877/145184 (executing program) 2022/05/15 14:17:59 fetching corpus: 2871, signal 119537/145809 (executing program) 2022/05/15 14:17:59 fetching corpus: 2921, signal 120585/146506 (executing program) 2022/05/15 14:17:59 fetching corpus: 2971, signal 121445/147117 (executing program) 2022/05/15 14:17:59 fetching corpus: 3021, signal 122511/147732 (executing program) 2022/05/15 14:17:59 fetching corpus: 3071, signal 123257/148250 (executing program) 2022/05/15 14:17:59 fetching corpus: 3119, signal 124009/148778 (executing program) 2022/05/15 14:17:59 fetching corpus: 3168, signal 124776/149266 (executing program) 2022/05/15 14:17:59 fetching corpus: 3218, signal 125732/149796 (executing program) 2022/05/15 14:17:59 fetching corpus: 3268, signal 126536/150255 (executing program) 2022/05/15 14:17:59 fetching corpus: 3318, signal 127211/150677 (executing program) 2022/05/15 14:17:59 fetching corpus: 3368, signal 127912/151109 (executing program) 2022/05/15 14:17:59 fetching corpus: 3418, signal 128637/151533 (executing program) 2022/05/15 14:17:59 fetching corpus: 3467, signal 129098/151896 (executing program) 2022/05/15 14:17:59 fetching corpus: 3517, signal 129783/152273 (executing program) 2022/05/15 14:17:59 fetching corpus: 3566, signal 130628/152635 (executing program) 2022/05/15 14:17:59 fetching corpus: 3616, signal 131303/152983 (executing program) 2022/05/15 14:17:59 fetching corpus: 3666, signal 132697/153321 (executing program) 2022/05/15 14:17:59 fetching corpus: 3716, signal 133266/153639 (executing program) 2022/05/15 14:17:59 fetching corpus: 3766, signal 134112/153870 (executing program) 2022/05/15 14:17:59 fetching corpus: 3816, signal 134690/153870 (executing program) 2022/05/15 14:17:59 fetching corpus: 3866, signal 135199/153870 (executing program) 2022/05/15 14:18:00 fetching corpus: 3916, signal 136558/153870 (executing program) 2022/05/15 14:18:00 fetching corpus: 3966, signal 137729/153870 (executing program) 2022/05/15 14:18:00 fetching corpus: 4015, signal 138645/153870 (executing program) 2022/05/15 14:18:00 fetching corpus: 4064, signal 139505/153870 (executing program) 2022/05/15 14:18:00 fetching corpus: 4113, signal 140151/153929 (executing program) 2022/05/15 14:18:00 fetching corpus: 4162, signal 140803/153929 (executing program) 2022/05/15 14:18:00 fetching corpus: 4212, signal 141767/153929 (executing program) 2022/05/15 14:18:00 fetching corpus: 4261, signal 142397/153929 (executing program) 2022/05/15 14:18:00 fetching corpus: 4311, signal 142807/153929 (executing program) 2022/05/15 14:18:00 fetching corpus: 4361, signal 143623/153929 (executing program) 2022/05/15 14:18:00 fetching corpus: 4411, signal 144138/153929 (executing program) 2022/05/15 14:18:00 fetching corpus: 4461, signal 144698/153963 (executing program) 2022/05/15 14:18:00 fetching corpus: 4511, signal 145342/153963 (executing program) 2022/05/15 14:18:00 fetching corpus: 4561, signal 145878/153964 (executing program) 2022/05/15 14:18:00 fetching corpus: 4610, signal 146694/153968 (executing program) 2022/05/15 14:18:00 fetching corpus: 4660, signal 147407/153978 (executing program) 2022/05/15 14:18:00 fetching corpus: 4709, signal 147909/153978 (executing program) 2022/05/15 14:18:00 fetching corpus: 4759, signal 148472/153981 (executing program) 2022/05/15 14:18:00 fetching corpus: 4809, signal 149110/154026 (executing program) 2022/05/15 14:18:00 fetching corpus: 4857, signal 149662/154026 (executing program) 2022/05/15 14:18:00 fetching corpus: 4907, signal 150144/154026 (executing program) 2022/05/15 14:18:00 fetching corpus: 4957, signal 151238/154042 (executing program) 2022/05/15 14:18:01 fetching corpus: 5006, signal 151632/154042 (executing program) 2022/05/15 14:18:01 fetching corpus: 5007, signal 151636/154046 (executing program) 2022/05/15 14:18:01 fetching corpus: 5007, signal 151636/154046 (executing program) 2022/05/15 14:18:02 starting 6 fuzzer processes 14:18:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000040)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000000)={@broadcast, @broadcast}, 0xc) 14:18:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0xf7ffffc5, 0x0, 0x0, 0x0, 0x0, "38037b0200"}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f0000000100)=0x38) 14:18:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8}, @NFTA_META_SREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 14:18:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r1, 0x0) shutdown(r1, 0x0) 14:18:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x894}, 0x10) write(r0, &(0x7f0000000040)="240000001a005f0214f9f4073109041e1100000000020002000200000800040006000000", 0x24) [ 25.950345][ T24] audit: type=1400 audit(1652624282.642:82): avc: denied { execmem } for pid=1811 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.970388][ T24] audit: type=1400 audit(1652624282.652:83): avc: denied { read } for pid=1814 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 25.991691][ T24] audit: type=1400 audit(1652624282.652:84): avc: denied { open } for pid=1814 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 26.015129][ T24] audit: type=1400 audit(1652624282.662:85): avc: denied { mounton } for pid=1814 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 26.036630][ T24] audit: type=1400 audit(1652624282.662:86): avc: denied { module_request } for pid=1814 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 26.220169][ T24] audit: type=1400 audit(1652624282.662:87): avc: denied { sys_module } for pid=1814 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 26.367619][ T1819] chnl_net:caif_netlink_parms(): no params data found [ 26.394640][ T1814] chnl_net:caif_netlink_parms(): no params data found [ 26.459247][ T1820] chnl_net:caif_netlink_parms(): no params data found [ 26.476262][ T1814] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.483423][ T1814] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.490955][ T1814] device bridge_slave_0 entered promiscuous mode [ 26.498106][ T1814] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.505186][ T1814] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.512778][ T1814] device bridge_slave_1 entered promiscuous mode [ 26.556813][ T1819] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.563868][ T1819] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.571973][ T1819] device bridge_slave_0 entered promiscuous mode [ 26.580793][ T1819] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.587880][ T1819] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.595466][ T1819] device bridge_slave_1 entered promiscuous mode [ 26.602978][ T1814] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.614718][ T1814] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.641080][ T1819] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.668168][ T1819] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.709291][ T1814] team0: Port device team_slave_0 added [ 26.718765][ T1820] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.725910][ T1820] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.733433][ T1820] device bridge_slave_0 entered promiscuous mode [ 26.744919][ T1841] chnl_net:caif_netlink_parms(): no params data found [ 26.757147][ T1814] team0: Port device team_slave_1 added [ 26.762829][ T1820] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.769888][ T1820] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.777491][ T1820] device bridge_slave_1 entered promiscuous mode [ 26.787723][ T1844] chnl_net:caif_netlink_parms(): no params data found [ 26.799022][ T1819] team0: Port device team_slave_0 added [ 26.824608][ T1819] team0: Port device team_slave_1 added [ 26.844841][ T1820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.856785][ T1820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.871762][ T1814] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.878721][ T1814] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 26.904850][ T1814] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 26.934561][ T1814] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.941560][ T1814] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 26.967497][ T1814] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.989522][ T1819] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.996474][ T1819] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.022479][ T1819] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.035038][ T1862] chnl_net:caif_netlink_parms(): no params data found [ 27.048512][ T1820] team0: Port device team_slave_0 added [ 27.058566][ T1819] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.065636][ T1819] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.091874][ T1819] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.118195][ T1820] team0: Port device team_slave_1 added [ 27.123907][ T1841] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.131023][ T1841] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.138451][ T1841] device bridge_slave_0 entered promiscuous mode [ 27.145526][ T1841] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.152631][ T1841] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.159997][ T1841] device bridge_slave_1 entered promiscuous mode [ 27.173416][ T1814] device hsr_slave_0 entered promiscuous mode [ 27.179957][ T1814] device hsr_slave_1 entered promiscuous mode [ 27.207237][ T1844] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.214308][ T1844] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.221937][ T1844] device bridge_slave_0 entered promiscuous mode [ 27.230122][ T1844] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.237219][ T1844] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.244829][ T1844] device bridge_slave_1 entered promiscuous mode [ 27.251578][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.258630][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.284516][ T1820] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.313634][ T1820] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.320797][ T1820] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.346708][ T1820] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.358928][ T1819] device hsr_slave_0 entered promiscuous mode [ 27.365509][ T1819] device hsr_slave_1 entered promiscuous mode [ 27.371777][ T1819] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 27.379447][ T1819] Cannot create hsr debugfs directory [ 27.386134][ T1841] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.413513][ T1841] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.430666][ T1844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.466628][ T1844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.475947][ T1862] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.483001][ T1862] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.490794][ T1862] device bridge_slave_0 entered promiscuous mode [ 27.523272][ T1862] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.530406][ T1862] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.538122][ T1862] device bridge_slave_1 entered promiscuous mode [ 27.545210][ T1841] team0: Port device team_slave_0 added [ 27.554303][ T1820] device hsr_slave_0 entered promiscuous mode [ 27.560857][ T1820] device hsr_slave_1 entered promiscuous mode [ 27.567229][ T1820] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 27.574859][ T1820] Cannot create hsr debugfs directory [ 27.583017][ T1844] team0: Port device team_slave_0 added [ 27.593258][ T1841] team0: Port device team_slave_1 added [ 27.606526][ T1844] team0: Port device team_slave_1 added [ 27.635879][ T1862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.656108][ T1844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.663058][ T1844] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.688949][ T1844] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.700485][ T1862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.714360][ T1841] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.721471][ T1841] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.747332][ T1841] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.758979][ T1841] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.766015][ T1841] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.791944][ T1841] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.804860][ T1844] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.811823][ T1844] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.837828][ T1844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.852842][ T1814] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 27.875054][ T1862] team0: Port device team_slave_0 added [ 27.881620][ T1862] team0: Port device team_slave_1 added [ 27.887468][ T1814] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 27.903722][ T1841] device hsr_slave_0 entered promiscuous mode [ 27.910250][ T1841] device hsr_slave_1 entered promiscuous mode [ 27.916750][ T1841] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 27.924346][ T1841] Cannot create hsr debugfs directory [ 27.942461][ T1814] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 27.955483][ T1844] device hsr_slave_0 entered promiscuous mode [ 27.962036][ T1844] device hsr_slave_1 entered promiscuous mode [ 27.968643][ T1844] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 27.976257][ T1844] Cannot create hsr debugfs directory [ 27.983856][ T1862] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.990856][ T1862] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.016854][ T1862] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.027858][ T1814] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.043205][ T1862] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.050177][ T1862] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.076635][ T1862] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.118738][ T1862] device hsr_slave_0 entered promiscuous mode [ 28.125485][ T1862] device hsr_slave_1 entered promiscuous mode [ 28.131820][ T1862] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.139634][ T1862] Cannot create hsr debugfs directory [ 28.169140][ T1819] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 28.178356][ T1820] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.188879][ T1820] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.197504][ T1819] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 28.212395][ T1820] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.232524][ T1819] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 28.241518][ T1820] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.255996][ T1819] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 28.275599][ T1841] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.289770][ T1841] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.299145][ T1841] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.317088][ T1814] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.324367][ T1841] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.362930][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.370936][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.381251][ T1814] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.393898][ T1844] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.414617][ T1844] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.425963][ T1844] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.448740][ T1814] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 28.459155][ T1814] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.470394][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.479041][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.487585][ T24] audit: type=1400 audit(1652624285.182:88): avc: denied { remove_name } for pid=1422 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.487813][ T1908] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.510266][ T24] audit: type=1400 audit(1652624285.182:89): avc: denied { rename } for pid=1422 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 28.517221][ T1908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.547499][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.556159][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.564506][ T1908] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.571546][ T1908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.579258][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 28.588215][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 28.596826][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 28.606193][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 28.614496][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 28.622813][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 28.631548][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.640239][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.648808][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.657062][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.665723][ T1844] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.675548][ T1862] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.684359][ T1862] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.694593][ T1862] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.703419][ T1862] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.712336][ T1906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.721019][ T1906] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 28.728854][ T1906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 28.761548][ T1820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.778446][ T1819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.790975][ T1814] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.805682][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 28.813030][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 28.826612][ T1820] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.841380][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.849360][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.857238][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.865981][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.874579][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.881659][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.902930][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 28.912136][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.920906][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.929252][ T1907] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.936312][ T1907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.944137][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 28.952620][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.960102][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.972028][ T1841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.980293][ T1819] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.991089][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.000131][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.008850][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.017392][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.024420][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.034743][ T1844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.049441][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.057422][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.066125][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.074625][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.083032][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.091682][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.099991][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.108245][ T1909] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.115282][ T1909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.123078][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.131552][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.139694][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.147977][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.156201][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.163836][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.178507][ T1844] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.190712][ T1841] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.198492][ T1820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 29.213239][ T1819] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.223758][ T1819] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.237140][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.245294][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.252881][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.260511][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.269104][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.277774][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.286275][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.294870][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.303219][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.311495][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.319880][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.328225][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.336466][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.345168][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.353461][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.380752][ T1862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.394952][ T1819] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.404523][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.412752][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 29.420325][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.428818][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.437043][ T1909] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.444100][ T1909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.451901][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.460316][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.468636][ T1909] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.475683][ T1909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.483421][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.492233][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.500727][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.509099][ T1909] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.516125][ T1909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.523815][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.532424][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.540683][ T1909] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.547721][ T1909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.555556][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.564296][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.573005][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.581408][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.590137][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.598493][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.607204][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.615627][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.623873][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.632281][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.640369][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 29.647937][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 29.655748][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.663522][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.671365][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.688827][ T1820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.704404][ T1841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.720800][ T1862] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.729043][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.740190][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.748982][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.757514][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.765949][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.774513][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 29.781994][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 29.789426][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.797618][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.805970][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.814146][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.822284][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 29.829774][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 29.837322][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.845322][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.853055][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.873629][ T1814] device veth0_vlan entered promiscuous mode [ 29.887332][ T1844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 29.904753][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.913360][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.922142][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.929216][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.937123][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.945729][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.954156][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.961254][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.968943][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.977113][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.985550][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.994126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.002884][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.011389][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.019811][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.028361][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.037183][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.045435][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.053558][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.061752][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.072442][ T1814] device veth1_vlan entered promiscuous mode [ 30.085876][ T1862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.097104][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.107048][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.114972][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.122746][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 30.130998][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 30.138885][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.150539][ T1844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.165753][ T1862] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.178974][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.192213][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.219832][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.227486][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.235082][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.243685][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.255533][ T1814] device veth0_macvtap entered promiscuous mode [ 30.264421][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.292292][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.309417][ T1814] device veth1_macvtap entered promiscuous mode [ 30.326218][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 30.334585][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.350009][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.365673][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.375526][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.384156][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.401450][ T1814] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.410520][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.419423][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.432962][ T1820] device veth0_vlan entered promiscuous mode [ 30.443326][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.457926][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.471414][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.479802][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.488132][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.496750][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.506572][ T1814] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.515991][ T1820] device veth1_vlan entered promiscuous mode [ 30.525054][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.532799][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.553502][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 30.561602][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 30.569774][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.578244][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.587853][ T1814] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.596623][ T1814] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.605315][ T1814] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.613977][ T1814] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.644311][ T1820] device veth0_macvtap entered promiscuous mode [ 30.657479][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.666240][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.674919][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.683286][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.692744][ T1819] device veth0_vlan entered promiscuous mode [ 30.706533][ T24] audit: type=1400 audit(1652624287.402:90): avc: denied { mounton } for pid=1814 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 30.713190][ T1844] device veth0_vlan entered promiscuous mode [ 30.739231][ T1820] device veth1_macvtap entered promiscuous mode [ 30.753678][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.761559][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.769352][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 30.777374][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.785524][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.793948][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.802238][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.811047][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.818992][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.826800][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.834279][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.842077][ T1841] device veth0_vlan entered promiscuous mode [ 30.856583][ T24] audit: type=1400 audit(1652624287.552:91): avc: denied { read write } for pid=1814 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.867675][ T1841] device veth1_vlan entered promiscuous mode [ 30.891622][ T1844] device veth1_vlan entered promiscuous mode 14:18:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000040)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000000)={@broadcast, @broadcast}, 0xc) 14:18:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000040)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000000)={@broadcast, @broadcast}, 0xc) 14:18:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000040)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) setsockopt$inet_mreqn(r0, 0x0, 0x40, &(0x7f0000000000)={@broadcast, @broadcast}, 0xc) [ 30.902459][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 30.913003][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.924714][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.936904][ T1819] device veth1_vlan entered promiscuous mode [ 30.953095][ T1841] device veth0_macvtap entered promiscuous mode 14:18:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) recvmmsg(r0, &(0x7f0000005440)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/4093, 0xf60}], 0x1}}], 0x300, 0x3c0, 0x0) [ 30.966654][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 30.975122][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 30.985420][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 30.994559][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.003490][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.012054][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.026021][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.034330][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.042765][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.051154][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.059955][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.068588][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.076274][ T77] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.084471][ T1862] device veth0_vlan entered promiscuous mode [ 31.101589][ T1844] device veth0_macvtap entered promiscuous mode 14:18:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) recvmmsg(r0, &(0x7f0000005440)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/4093, 0xf60}], 0x1}}], 0x300, 0x3c0, 0x0) [ 31.117866][ T1819] device veth0_macvtap entered promiscuous mode [ 31.129491][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.138345][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.146986][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.155689][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.164331][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.172412][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.180624][ T1820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.191139][ T1820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.203448][ T1820] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.212064][ T1844] device veth1_macvtap entered promiscuous mode 14:18:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) recvmmsg(r0, &(0x7f0000005440)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/4093, 0xf60}], 0x1}}], 0x300, 0x3c0, 0x0) [ 31.220240][ T1819] device veth1_macvtap entered promiscuous mode [ 31.231053][ T1862] device veth1_vlan entered promiscuous mode [ 31.238746][ T1841] device veth1_macvtap entered promiscuous mode [ 31.246236][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.254511][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.262556][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.271438][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.279456][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.289049][ T1907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.299523][ T1820] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.308364][ T1820] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 14:18:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) recvmmsg(r0, &(0x7f0000005440)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)=""/4093, 0xf60}], 0x1}}], 0x300, 0x3c0, 0x0) [ 31.317131][ T1820] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.325827][ T1820] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.363251][ T1844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.373746][ T1844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.383595][ T1844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.394072][ T1844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.405631][ T1844] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.415531][ T1819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.426101][ T1819] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.435978][ T1819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.446805][ T1819] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.456697][ T1819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.467223][ T1819] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.479730][ T1819] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.498447][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.508929][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.518818][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.529344][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.529358][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.529425][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.529439][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 31.529450][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.531861][ T1841] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.542404][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.542851][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.543176][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.543643][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.544159][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.545328][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.545855][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.550408][ T1844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.660170][ T1844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.660185][ T1844] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.680482][ T1844] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.692803][ T1844] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.705565][ T1819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.716011][ T1819] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.725907][ T1819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.736541][ T1819] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.746355][ T1819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.756852][ T1819] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.768114][ T1819] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.779437][ T1819] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.788371][ T1819] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.797060][ T1819] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.805911][ T1819] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.818942][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.827496][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.836031][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.844572][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.853322][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.861945][ T1908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.871229][ T1862] device veth0_macvtap entered promiscuous mode [ 31.880835][ T1844] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.889595][ T1844] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.898369][ T1844] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.907160][ T1844] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.919487][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.930082][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.939941][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.950492][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.961591][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.972049][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.981987][ T1841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 31.992429][ T1841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.003708][ T1841] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.016832][ T1862] device veth1_macvtap entered promiscuous mode [ 32.031040][ T1906] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.039291][ T1906] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.048048][ T1906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.058259][ T1841] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.067163][ T1841] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.076010][ T1841] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.084857][ T1841] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.133935][ T1912] ================================================================== [ 32.142028][ T1912] BUG: KCSAN: data-race in prandom_seed / prandom_u32 [ 32.148788][ T1912] [ 32.151089][ T1912] write to 0xffff888237c28848 of 8 bytes by task 1909 on cpu 0: [ 32.158703][ T1912] prandom_u32+0x10e/0x190 [ 32.163105][ T1912] __ip_select_ident+0x12d/0x190 [ 32.168021][ T1912] iptunnel_xmit+0x2f6/0x490 [ 32.172590][ T1912] udp_tunnel_xmit_skb+0x15d/0x170 [ 32.177683][ T1912] send4+0x439/0x500 [ 32.181562][ T1912] wg_socket_send_skb_to_peer+0x92/0x120 [ 32.187174][ T1912] wg_packet_tx_worker+0x142/0x360 [ 32.192264][ T1912] process_one_work+0x3d3/0x720 [ 32.197092][ T1912] worker_thread+0x618/0xa70 [ 32.201655][ T1912] kthread+0x1a9/0x1e0 [ 32.205714][ T1912] ret_from_fork+0x1f/0x30 [ 32.210109][ T1912] [ 32.212545][ T1912] read to 0xffff888237c28848 of 8 bytes by task 1912 on cpu 1: [ 32.220062][ T1912] prandom_seed+0xbb/0x270 [ 32.224462][ T1912] addrconf_dad_work+0x265/0xbb0 [ 32.229379][ T1912] process_one_work+0x3d3/0x720 [ 32.234206][ T1912] worker_thread+0x618/0xa70 [ 32.238770][ T1912] kthread+0x1a9/0x1e0 [ 32.242828][ T1912] ret_from_fork+0x1f/0x30 [ 32.247219][ T1912] [ 32.249516][ T1912] value changed: 0x5f028510096cc9ce -> 0x625e7f316eef0ca0 [ 32.256685][ T1912] [ 32.258991][ T1912] Reported by Kernel Concurrency Sanitizer on: [ 32.265202][ T1912] CPU: 1 PID: 1912 Comm: kworker/1:5 Not tainted 5.18.0-rc6-syzkaller-00161-gbc403203d65a-dirty #0 [ 32.275852][ T1912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.285884][ T1912] Workqueue: ipv6_addrconf addrconf_dad_work [ 32.291848][ T1912] ================================================================== [ 32.307926][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.318407][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.328323][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.338798][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.348736][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.359416][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.369240][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.379812][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.389627][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 32.400033][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.411361][ T1862] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.425247][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.433987][ T1912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.451053][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.461596][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.464039][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 32.464049][ T24] audit: type=1400 audit(1652624289.152:95): avc: denied { bpf } for pid=2035 comm="syz-executor.5" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 32.471418][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.471431][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.471439][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.499282][ T24] audit: type=1400 audit(1652624289.172:96): avc: denied { map_create } for pid=2035 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.508491][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.508507][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.508521][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.508528][ T1862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 32.508538][ T1862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.510764][ T1862] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.518694][ T24] audit: type=1400 audit(1652624289.172:97): avc: denied { perfmon } for pid=2035 comm="syz-executor.5" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 32.518715][ T24] audit: type=1400 audit(1652624289.172:98): avc: denied { map_read map_write } for pid=2035 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.548492][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.569102][ T24] audit: type=1400 audit(1652624289.252:99): avc: denied { prog_run } for pid=2035 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.587608][ T1909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.589498][ T24] audit: type=1400 audit(1652624289.252:100): avc: denied { open } for pid=2035 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.702020][ T24] audit: type=1400 audit(1652624289.252:101): avc: denied { kernel } for pid=2035 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.721982][ T24] audit: type=1400 audit(1652624289.302:102): avc: denied { name_bind } for pid=2039 comm="syz-executor.4" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 32.733658][ T1862] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.744163][ T24] audit: type=1400 audit(1652624289.302:103): avc: denied { node_bind } for pid=2039 comm="syz-executor.4" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 32.752724][ T1862] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 14:18:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0xb, 0x201, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}]}, 0x2c}}, 0x0) 14:18:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8}, @NFTA_META_SREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 14:18:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0xf7ffffc5, 0x0, 0x0, 0x0, 0x0, "38037b0200"}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f0000000100)=0x38) [ 32.775129][ T24] audit: type=1400 audit(1652624289.322:104): avc: denied { create } for pid=2037 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 32.783855][ T1862] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.814727][ T1862] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 14:18:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x894}, 0x10) write(r0, &(0x7f0000000040)="240000001a005f0214f9f4073109041e1100000000020002000200000800040006000000", 0x24) 14:18:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r1, 0x0) shutdown(r1, 0x0) 14:18:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0xb, 0x201, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}]}, 0x2c}}, 0x0) 14:18:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0xf7ffffc5, 0x0, 0x0, 0x0, 0x0, "38037b0200"}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f0000000100)=0x38) 14:18:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r1, 0x0) shutdown(r1, 0x0) 14:18:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0xb, 0x201, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}]}, 0x2c}}, 0x0) 14:18:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8}, @NFTA_META_SREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 14:18:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0xf7ffffc5, 0x0, 0x0, 0x0, 0x0, "38037b0200"}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f0000000100)=0x38) 14:18:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0xb, 0x201, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}]}, 0x2c}}, 0x0) 14:18:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x894}, 0x10) write(r0, &(0x7f0000000040)="240000001a005f0214f9f4073109041e1100000000020002000200000800040006000000", 0x24) 14:18:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r1, 0x0) shutdown(r1, 0x0) 14:18:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8}, @NFTA_META_SREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) 14:18:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x894}, 0x10) write(r0, &(0x7f0000000040)="240000001a005f0214f9f4073109041e1100000000020002000200000800040006000000", 0x24) 14:18:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) [ 33.050202][ C1] hrtimer: interrupt took 24695 ns 14:18:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x8, 0x9, &(0x7f0000001380)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @btf_id, @jmp={0x5, 0x1, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}, @jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffc4, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000180)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0xac727313353a1ed0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x2, 0x0, 0x5, 0x8a5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001200)=[0x1, r2, r3]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x5, &(0x7f0000000340)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6, &(0x7f00000012c0)=@raw=[@call={0x85, 0x0, 0x0, 0xa}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c51}, @jmp={0x5, 0x0, 0xd, 0x3, 0x2, 0x80, 0x4}], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="1819006a", @ANYRES32, @ANYBLOB="00000000020000005773000104000000850000006d00000085100000f9ffffff18200000", @ANYRES32, @ANYBLOB="00000000f801000018370000030000000000000000000000180000000100008000000000000000007506500011000000182a0000", @ANYRES32, @ANYBLOB="000000001f000000"], &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0xe0, &(0x7f0000000200)=""/224, 0x41100, 0x8, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x4, 0x1bac, 0x7fffffff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r0, r4, r5]}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b0, &(0x7f00000017c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\x8da\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7.\x8dD<\x88\xbc\x0eV7]\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x99Q\xa9D\xff,\"\xdc\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x0f\xc9\x93\x168\xee \x02I\xf8,&\xea\xc1\xceg\xcb\x89!H\x82\xad\x81\xd0\xc9blW\x05H\xbd\x16\xeb\x9c\x1fTF\x84z\xb9\xd5\x9e\x18\xa9\xfaG\xb5\r\a~\xb0\xecF\xf8z\x1e)\xddx\xa5\xa3\x1bm\xd8\xda\bCY\x88\xd9\xba\x92\fX\x01N$\xcd\x98\xcf\xd1\xcd\x8a<~v\x8d_5\xcf\x02\x81A,S\xb3\x90\x1b\xbcK\x86\xba\x170\xae->\xc6\xbf\xc3|\x10\xd2s\x9e\x97\xe6\x12Y\x06\x858]T\x97\x89C\xdf\x15O\x18\xfa\xe8U\x14\xda\x8ez\xd9\xe5\x92\xa9\x14\xf6\x15,\xb6\xbd~\x81\x90\x1a\x83;\x11o\xear\x1dG\xf9f\xe5\xc0\xf5\xe7\x11 iP#\x1e\x10{OOR\xa6\x85h\xb1\xba\xa6\xdd\xf2\a2M\x82\xcb\v\xb1\xe0\xb4\xb1\x06\x97=\x16\x12(^s\xea\x9aN,\x17v1I%W\xab9\xf3uD|>\xd6GQ\xce\x04\xf2PA:`\x81'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 14:18:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast1}, 0x10) listen(r1, 0x0) shutdown(r1, 0x0) 14:18:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x8, 0xa, &(0x7f0000000780)=ANY=[@ANYRES64], &(0x7f0000000180)='GPL\x00', 0x8e67, 0x9f, &(0x7f0000000280)=""/159, 0x41000, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xb, 0xffff}, 0x10, 0x0, r1, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x7, 0x7, 0x8a5, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r2, &(0x7f0000000100), &(0x7f0000000000)=""/14}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0x4, 0x4, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f00000001